Date post: | 14-Jul-2015 |
Category: |
Technology |
Upload: | data-resolve-technologies-pvt-ltd |
View: | 117 times |
Download: | 0 times |
inDefend-Business Integrated Data Privacy Offerings
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM
www.dataresolve.com
Agenda
Insider Threat Challenges
Understanding Insider Threats and Trends
What 3rd Party Assessment Reported
Employee DNA – Data Privacy Standpoint
What’s the approach moving forward?
Data Resolve Offerings, Architecture & Differentiators
About Data Resolve
Customer Speaks
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 2
Insider Threats Reporting Challenges
Are we able to monitor employee behavior before s/he leaks the information?
Are we able to assess his / her productivity vis-a-via organization goals?
Are we able to enforce strong BYOD controls?
Are we getting integrated view of employee activities from multiple service points that doesn’t fall under DLP purview?
Are training sessions/ simulations games prevented insider threats?
Insider threat is impossible to counter because of the insider’s resources and access permissions?
Do business takes responsibility of these challenges?
Are we able to catch disgruntled or employee’s/contractors with mal-intent well before?
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 3
Let’s Look at What Research Says – Ineffectiveness (Cont.)
Alarming facts:
More than 50% of the service provider organisations revealed that insiders who do not work in IT department and consequently do not have privileged access have carried out insider incidents at their organisations.
As per 89% of the service provider organisations, behavioural motivation to break existing norms is the primary motive that leads to insider threat.
Audit and review is still the primary source of identification and learning about insider incidents with around 89% service provider organisations and 75% client organisations being alerted about insider incidents at service provider organisations through this method.
Source: PWC-DSCI Study
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 4
Let’s Look at What Research Says – Ineffectiveness (Cont.)
Source: PWC-DSCI Study
5
As per 89% of the service provider organisations, behavioural motivation to break existing norms is the primary motive that leads to insider threat.
Let’s Look at What Research Says – Ineffectiveness
Source: PWC-DSCI Study Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 6
Employee DNA – Data Privacy Standpoint Employee Viewpoint:
So many data privacy trainings, enablement in progress, now I have one DLP client as well. Don’t you trust me?
Am not happy as am tied with so many security control, allow me to breathe.
Every-time you ask me to enforce rights on documents that am sharing with externals partners, this is part of my job.
CISO Viewpoint: As a CXO how do we ensure we monitor, protect this data lifecycle from a single pane of glass, I have so many tools to manage now
Difficult to get an integrated view across messengers, chats, social sites, BYOD devices, web services, cloud services, rights management, mobile behaviour analysis and its increasing . .too much on the table.
Who did what, how, what went out, why we couldn’t stop it; study says it takes hours to identify this from set of people monitoring alarms from DLP…is it effective?
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 7
Our Recommended Approach
Build an integrated data privacy control framework that addresses all these challenge's proactively….
Approach should tie up all end – points and data movements be it mobile, handheld, end-points, irrespective of where data goes
Reduce burden on end-users and departments when it comes to there involvement, define boundaries and react
Empower business heads so they take there own decisions with right information
Reduce monitoring foot-print from multiple controls to one
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 8
Data Resolve Offerings
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 9
inDefend Integrated Data Privacy Platform mitigates risks associated with information life-cycle:
Platform mitigates risks associated with data movement within and outside organization boundaries
Platform covers all end-points – tablets, mobiles, end-point computing devices
Integrated security analytics layer provide view on the fly for data moving outside to trusted and untrusted users
Provide forensics, investigation support with due-diligence
Enforced employee monitoring and behaviour analysis
Data Privacy Analytics platform on exiting vendor products.
Centralized Cloud Delivery Model
Stack covers: Data Leak Prevention
Information Rights Management
Mobile Workforce Management
Employee Behaviour Monitoring
Enforced Encryption
Employee Forensics
Asset Management & Monitoring
Offerings Architecture
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 10
Intelligence Factors
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 11
The intelligence of the solution lies in the approach of automatic detection of all the sensitive events generated in the network, and presentation to the administration and top management in the following ways:
Cyber Intelligence Sensors
– Social network styled alerts
Daily Email Reports *
– Summary of alerts generated throughout the day
Real-time SMS Alerts*
– SMS Notification sent for the most sensitive activities happening in your network
Cyber Intelligence Reports*
– Advanced insights are provided into your organization’s activities and recommendations are given to improve processes
Screenshot Monitoring*
–Periodic screenshots of end-user’s desktop activities
Cyber Seal*
–Provide departments real-time data violation status
Differentiators
Integrated client
Stealth supported
Less foot-print on machine (Less than 10% run-time memory utilization)
Multiple OS support (Windows family, Ubuntu, Linux, Android, IOS)
Cloud supported
Encrypted communication (external storage devices with white-labelled approach + partial disk)
Centralized policy roll-out
Offline support
Integrated architecture enforces real-time blocking across data life-cycle that is missing in disparate vendor approach
Customized Reporting (This integrates with your organization business processes and a customized approach that no one delivers)
Integrated dashboard for advanced analytics
DLP Analytics (Reduced cost to manage data privacy operations)
Enforced external drive encryption (external storage devices with white-labelled approach + partial disk)
Enforced rights management (on the fly enforced options on edit, print, forward, up-load, wipe out, print-screen options)
Employee Forensics
Employee monitoring and productivity analysis
Focus on Co-creation
Advanced mobile workforce management module
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM
End - Point
Architecture
Reporting
Advanced Features
12
About Us Incubated in IIT Kharagpur
Focused on addressing data theft, data loss with security analytics from on-premise and cloud platform,
product christened as “inDefend” targeted for Enterprise, SMB and End-Consumers
TIE, Kolkata selected the company as best emerging IT Company from West Bengal
70+ enterprise customers
50000+ retail product downloads
Customers in 15+ industry segments
6 million+ work hours analyzed
1000+ alerts generated daily
CEO & Founding Team Member Alma-Mater –IIM-Kolkata
CTO & Founding Team Member Alma-Mater –IIT-Kharagpur
Strategic Alliance Lead & Founding Team Member Alma-Mater –IIT-Kharagpur
Client Relationship Lead & Founding Team Member Alma-Mater – IIT-Kharagpur
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM
Leadership Team
Our Awards
13
Customer Speaks
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 14
"Easier for IT to track and stop unprofessional activity of the users. Support is excellent.“
- IT Manager, Mid-sized ITeS company, Kolkata
"Indefend is exceptional from any other product available in the globe, i have tested many security
software but the features as mentioned in those software's does not meet when it comes to
practical testing. Indefend meets all the features as mentioned and works perfectly. The technical
support is prompt and very responsive.”
- Senior IT Administrator, Mid-sized ITeS company, Kolkata
"In-defend Enterprise has been the best experience I've ever had in solving issues of Data Security.
Ive tried many other products but in-defend gave me the best solution. Also the constant upgrade of
its features and it excellent customer support team gives me much confidence in Data Resolve
Technologies and shows how competent they are in delivering their goals.“
- IT Operations Manager, Petroleum Engineering company, Nigeria
Client Testimonials
70+ enterprise customers
13 countries covered
Customers in 15+ industry segments
6 million+ work hours analyzed
1000+ alerts generated daily
Thank You!!
Our Award Winning Product
Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM
Website www.dataresolve.com www.indefend.com Demo https://cloud.indefend.com/ Email [email protected]